Analysis
-
max time kernel
118s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21/09/2024, 00:30
Static task
static1
Behavioral task
behavioral1
Sample
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
Resource
win10v2004-20240802-en
General
-
Target
eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html
-
Size
4KB
-
MD5
eebc0a8c44234d62d8bf1d4b7d657053
-
SHA1
fa0974df64fcef7b100768a2714e1ab69e6403af
-
SHA256
fd79c62aef3e1959624ade3226b1aef14b8c7b2b07ee179dc677cce399393aaa
-
SHA512
5997df9d4a5111a995db1199709369b2f71054fc303c94c723ca947f3911c2f7a90bc56ff68d8c8468c05191da2527c6123009d2ccf4c53e6ccad9711f127999
-
SSDEEP
96:Pk7yJozTGknaEFHVKDZTBJl7sNjtXATIQFMA5e3fhrvDJUgwa71D5iJ8oScvIjLd:Pk7yY1aEFHVKtF37sNjtXATIQFM93pDt
Malware Config
Signatures
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language IEXPLORE.EXE -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes\DownloadRetries = "2" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000b3e8f15f634dfc43bfa5c3a2648d88c40000000002000000000010660000000100002000000022f9bcdc1a1d30ab3f9faebd20d0933928699beb17becf984cd008e77f4038ff000000000e8000000002000020000000e0f6392094da8262b7f17ee970bf6e95e4cf3085db0143d0df2b5afa7b30e29120000000f4a4494fc79436f2fb4e774311c1c5e4f413c5df67df952c7b85a7163034a63140000000498ba5087724a9dde22b900cfe9d9ec6dcae1c591589750aeec5fe60ec5723dc61ad4c9f82cb1f1d2692f357cfbbc457d9b1b8c5c2cc513ac625ddee4594b9b5 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\SearchScopes iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 10148290bd0bdb01 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{BBF72B31-77B0-11EF-9630-523A95B0E536} = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "433040509" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2872745919-2748461613-2989606286-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1640 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 1640 iexplore.exe 1640 iexplore.exe 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE 1592 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1640 wrote to memory of 1592 1640 iexplore.exe 30 PID 1640 wrote to memory of 1592 1640 iexplore.exe 30 PID 1640 wrote to memory of 1592 1640 iexplore.exe 30 PID 1640 wrote to memory of 1592 1640 iexplore.exe 30
Processes
-
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" C:\Users\Admin\AppData\Local\Temp\eebc0a8c44234d62d8bf1d4b7d657053_JaffaCakes118.html1⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1640 CREDAT:275457 /prefetch:22⤵
- System Location Discovery: System Language Discovery
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1592
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b12af375816ee1aa506e0e3fcaf97b2c
SHA16de279cbe4c3980353042aad9251e2d1574c1e39
SHA2561a7f608b85560f4a9ecd12951a4967acb7ac93fd10dc45bf84b5da0abafb00ed
SHA512a91796522343b0719ffff2b34b01c2901f1d4d2844957d71f7df8aa3208723ab2993e0d48e5a02106e83f95e4f97fc8c3aed03d832b084fa45ed81507b56a654
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD575bc4d92df781368f115ce6a2664af14
SHA1ef67d28da4d17b22d6cc7a86803d0be780994ab6
SHA256ad3db94d7375c10b276e6a7412e186e95e0c5b7680f98df022195aa14ff931dd
SHA512b8bb1bbd421bcb88cd2768856afb6ed504b50f894ef748c212ad6603c3b7a17d8b0a8708a69fdc0daafdd15a9c1bcb7a2815d8769767c60c6cd58face5ef6d6d
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD589c40397c3bf719aedfd3be8bd39f73b
SHA15e4f8d856f56a5f16348a8e7e3c08b5a4586ef7d
SHA2562fb22ec140922f867a26f2b3ab4db6cc5f9b86b648a58712302a7d599191ff60
SHA5120f6cd8ec18aa172366ec857df87acff1166ea07e3ba32c5d61a7e5308db2fa99f8013b24e6e8e9c7b17d2483fcdd6760fedde88461c8f25ca1296b1f1c848d5c
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af458ac08573bb08014b722ff26501ee
SHA15ae42305f4a76060554b47390df7ff1c474101dd
SHA256063db1f907f5e190ca43bb4f741a74e0ee22a6fd38c1cbf4137270d496fc2eb7
SHA512a5a74d69a81e7cbe4a6e4f90691083faeabda9582c0ed3252856bb1d1002ef0bbc8a8a8d5410dee798609a713ef2e9e90796e3d9cbf170a3e887e9bbcee13e49
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5785ecca9003dc5d269b1cc6c6d3a1fb7
SHA1c1fe5c69935d9efc7f6c5e227496a899ad38cbe9
SHA256faeb3b1cbb2a9d1be80ff5706fce510a6bc25e18af3e83e9f58b04cfa64ae970
SHA5120a8afbe0c0eb9335889abc5f2ef6928e751151ca47001b39d4778d8f51ee8c5b3454c85a6bec1df84b99fedfd63ffa783be60a09eee2826349b51a909ee0fd8e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD574f8a97f530727f40ffa7fc740bd7143
SHA10f63c23458d3c73c76030619e286d8e9ebf3a374
SHA25643660311f5c28ea09b1b1311b19f2a803c8eadf24ce4930fb9b0052fbad2c84f
SHA512bc42febdc0a68036f21094f4a81c68077fb7c7c7d79f79083d5535cbdef58d7191385c4d38ed5ebac95235f4225a9fb2cd9ce52b923809ff6f8ec0225e390304
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD56bd8963c7bc401d74172d9c738309597
SHA139b81e7d00da7a07da2070fe271cb8724a99b604
SHA2561635b82e31112f8c8d159252088f32401c5fc3cbb10818b933f2a7a4be7e9366
SHA512fba9211b7d5f751a1fc7bb838b99c880a87455b47342bbc87273d1c92624e08cb3d53dacda08fb2cb68d52f0549092f97bf26d2dd16634c0479ace40d44daa88
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5b99cda7d1b8b43a985131c028f337e42
SHA1c4eef8c03a326b49a8f910709f35700b13ef1ffa
SHA256b576338437f7049fa31ff101881d573f21f7fc9f042446ff66abee9b1eb5e676
SHA5122810ac60cc9919d2c7ad06123531d9b27164e0762312b0c5ed9d063642e86979849aed2d7d222b856731d486e2e8c344982f11efe8ec71a4c8a311b2cf2a9303
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52c76f97a77224c8cc5e145e8221f732c
SHA1526df2d400918567c1457a17e4cf61160fd77123
SHA2560ce6863bef5cf0a33d3f18a94a760a7da98e10670bf40c32f0ccd88fa4a3a14a
SHA51211a4c2e6e2a62b34414ab3c420ec6625278cee7702e493da7e8f8bddd8a10e8a70469f7c440d1cffe437f910cdabcab3041f2d1f191dea80b60d56d7536fd6c7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD531c860346ba2410b2e6886397d16a336
SHA1c646643539f090af2d45a1dd6c6603c1c3f6f768
SHA2566d5cfb5ed5ecc78530e5a9c8b4b0b20f0c0d01231ac1ec2cafaba29ee335be3a
SHA512b6ae59e716d53dab3b26df148c6a09e6b41fa595d28779dccabcd3bfba5329b03bb83dfcc4e33d08d104d86dda0221f2a66fe2d88e2448122641f29b014cd791
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5af30fa6845c710b3018888f0d55ddbe2
SHA13dfbb77c63065105b797ab6d2479cb9ba7ec3b96
SHA256054e97402d07d99bd4d042a4732a192f22d0b34211cab424b327ca14173d968f
SHA512b26f52fd659104eecc701f875cb3f63583aca42bdfdb1bb8796c06d8e70dd178a065a05e456dc005cfa5874cc47b0cb8314b36bf5dca4cbda97b8e96db837720
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52aefa1320543a2a704c5e89ab9b27c54
SHA17400331ff1b49de38a6dfb88a9887da6198053cf
SHA25683cc8355513569f1d212eb67a6f7f0bcc80330552e94b9369a1373e72a7acdde
SHA512bdbb8976ba3d19f338bc90dd67e6d3e32e634cade258ee62b36adcd218612c0c7de9985f80a467cbca0a8a85581ff2a5f073bd704f23a0b73957099d47610c07
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5f5be6b38841b72e74a03f7d735414abf
SHA1e47c85052529bd3cc7460255e16be5a4fede62ed
SHA256b0b0f47c35012afc561ffa1ceb01a62d9f9263097960a96c621d29a2e796ae3d
SHA512f1c1430390088969b66624b3027715f30fd78e172cf116ba815948fd853ea3822de67607e96e5a92c4963540963641d18797196586df5e8071d1bcfa2c0bddb4
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5124b978a0ca76d137c343a14c20df825
SHA1abba309c979e0c56257ad7237cf75e205bbc7f91
SHA256082d7b9174b2d80c56df4101fe591aff026956b61dfff29c2a605dd8306dbf17
SHA51286070bd5d8271fbbfad867a65bdef70e189c7c7fef6db061e4cb32018991a200b3b6f7dfc652dae6409d0d6fb888f66ae0bf31e205762d4058787373533e564a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD55ae131e7eaf449de5622e5696a4d0df5
SHA1065781e36ab397301aad8ddb5b841216adf3e048
SHA256241de8419edffe1ed69097b26faebc393b2f5d1252c911f55b77eb75b1fd6cc1
SHA5124d785d50ddf45ee685dacc8f4828f6c2dceb820c628fc962f45329393229ba6dea88678d0f85f365271bb45fa467cd6c4705b89e76bfc15c3f21c5ff618e2047
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD507a8d0bba09126874cb13f07178c9379
SHA1fa4f6913917bb0f3432ea158db63829492162b09
SHA2562c830bad9b699b1e721c30de0f0f806be9ab512c6a95ab9f437de2350d972681
SHA512a4f4499e50eb8934ab274a6b7d9b770145fb8c4970619d2adffd31bfd17d3deac2336e6271599a6e176bfaed4a947ed9617c87d3db81c9e409f56b7f42cd8674
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD5e806fbe4bbbebfc20ae2f47d220fa21b
SHA1aaae3b8cdb29dc13c2ba5ccd1ed7198661820992
SHA256638f48ac9f417f018b6b52956be8e02104cb63a62612c2b1dfda9ff7b16a07f1
SHA512ae8a9babcf413ede30ef2c9bca1f8310a6f16c99cf029ba8937409165590ce7372eea32662bc6c2324129159f6bacd99d3321d126500d54ac4496008b253f126
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD597e53e69ba331023e762415a6169aeef
SHA1e9ce37e3878dee44fba8823f78f2f74f3cd1a439
SHA256aa4aa9c681ecdceb0aec84a15465c340068f9cb8d77ecc7a7bb975de3426d8ff
SHA51286e328abb96e9dfc585bb3bd4b468e3641d725158e4fd00a68014e619649b37726883a5d959ea28a4a71e1b7d3ac1234d5a5228637a8edeaab930a555577cba1
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52395cbc1e2e08e00ad619969c44d85b3
SHA17ef7eb665b058ba42d2497ad4156240459745c0c
SHA256dff7fcbee34e4b36f867cc8418f2d0e4c56042fb57413452014c0787310525ba
SHA512503ca3e42f20da217085d036a9f6db1eef2c902e2abfa4d17687f750f218b69b8ca309d56eef58e50f552ca93ee7d079c8880603f8e81effcfb379fd0a4e360a
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b